Data Exfiltration Prevention Quiz
12 Questions
2 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What can be inferred from the firewall log information?

  • The victim's IP address is 136.127.92.171
  • A botnet DDoS attack was blocked
  • The Trojan was blocked, but the file was not
  • A download was blocked from a web server (correct)
  • What would be the MOST likely reason for the message 'Your connection is not private'?

  • Brute force
  • DoS
  • Disassociation
  • On-path (correct)
  • What would be the BEST way to provide a website login using existing credentials from a third-party site?

  • Federation (correct)
  • PEAP
  • EAP-FAST
  • 802.1X
  • Which term would BEST describe the expected frequency of firewall hardware failure between repairs?

    <p>MTBF</p> Signup and view all the answers

    What would be the BEST way to prevent data exfiltration using external storage drives?

    <p>Create an operating system security policy to prevent the use of removable media</p> Signup and view all the answers

    What category BEST describes devices vulnerable to remote control by a third-party?

    <p>MFD</p> Signup and view all the answers

    Which standard provides information on privacy and managing Personally Identifiable Information (PII)?

    <p>ISO 27701</p> Signup and view all the answers

    In the context of preventing data exfiltration, what would be the LEAST effective method?

    <p>Only allow applications that do not use removable media</p> Signup and view all the answers

    Which technology would be most suitable for ensuring that login access is only available if a person is physically within the same building as the server?

    <p>Blockchain</p> Signup and view all the answers

    In which order should a security administrator collect the most volatile data before powering down the database servers to respond to a potential security breach?

    <p>Memory, CPU registers, temporary files, remote monitoring data</p> Signup and view all the answers

    What is the purpose of using a SHA256 hash value provided alongside an ISO download link?

    <p>Verifies that the file was not corrupted during the file transfer</p> Signup and view all the answers

    What would be the BEST way to ensure that login access should only be available if a person is physically within the same building as the server?

    <p>Biometric scanner</p> Signup and view all the answers

    More Like This

    Use Quizgecko on...
    Browser
    Browser